Skip to content

Cross-site Request Forgery in fastify-csrf

High severity GitHub Reviewed Published Jan 20, 2021 to the GitHub Advisory Database • Updated Jan 27, 2023

Package

npm fastify-csrf (npm)

Affected versions

< 3.0.0

Patched versions

3.0.0

Description

The package fastify-csrf before 3.0.0 has a set of issues that affect its ability to do CSRF protection.

  1. The generated cookie used insecure defaults, and did not have the httpOnly flag on: cookieOpts: { path: '/', sameSite: true }
  2. The CSRF token was available in the GET query parameter

References

Published by the National Vulnerability Database Jan 19, 2021
Reviewed Jan 20, 2021
Published to the GitHub Advisory Database Jan 20, 2021
Last updated Jan 27, 2023

Severity

High
8.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS score

0.212%
(60th percentile)

Weaknesses

CVE ID

CVE-2020-28482

GHSA ID

GHSA-49wp-qq6x-g2rf

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.